CVE Vulnerabilities

CVE-2023-2253

Undefined Behavior for Input to API

Published: Jun 06, 2023 | Modified: Jan 07, 2025
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
6.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

A flaw was found in the /v2/_catalog endpoint in distribution/distribution, which accepts a parameter to control the maximum number of records returned (query string: n). This vulnerability allows a malicious user to submit an unreasonably large value for n, causing the allocation of a massive string array, possibly causing a denial of service through excessive use of memory.

Weakness

The behavior of this function is undefined unless its control parameter is set to a specific value.

Affected Software

NameVendorStart VersionEnd Version
Openshift_api_for_data_protectionRedhat- (including)- (including)
Openshift_container_platformRedhat4.0 (including)4.0 (including)
Openshift_developer_tools_and_servicesRedhat- (including)- (including)
OADP-1.1-RHEL-8RedHatoadp/oadp-velero-plugin-rhel8:1.1.6-5*
Red Hat OpenShift Container Platform 4.11RedHatopenshift4/ose-docker-registry:v4.11.0-202310101543.p0.g431737b.assembly.stream*
Red Hat OpenShift Container Platform 4.12RedHatopenshift4/ose-docker-registry:v4.12.0-202309261625.p0.g9e75355.assembly.stream*
Red Hat OpenShift Container Platform 4.13RedHatopenshift4/ose-docker-registry:v4.13.0-202309120502.p0.gdb5611b.assembly.stream*
Docker-registryUbuntubionic*
Docker-registryUbuntuesm-apps/bionic*
Docker-registryUbuntuesm-apps/focal*
Docker-registryUbuntuesm-apps/jammy*
Docker-registryUbuntuesm-apps/xenial*
Docker-registryUbuntufocal*
Docker-registryUbuntujammy*
Docker-registryUbuntukinetic*
Docker-registryUbuntulunar*
Docker-registryUbuntutrusty*
Docker-registryUbuntuupstream*
Docker-registryUbuntuxenial*

References